Preferred Language
Articles
/
ijl-150
Warts Treatment by 810 nm Diode Laser Irradiation: A New Approach
...Show More Authors

The present work was done in an attempt to build systematic procedures for treating warts by 810 nm diode laser regarding dose parameters, application parameters and laser safety. The study was done in Al- Kindy Teaching Hospital in Baghdad, Iraq during the period from 1st October 2003 till 1st April 2004. Fifteen patients completed the treatment and they were followed for the period of 3 months. Recalcitrant and extensive warts were selected for the study. Patients were randomly divided into 3 groups to be treated by different laser powers 9, 12 and 15 W, power density of 286 W/cm2, 381W/cm2, 477 W/cm2 pulse duration of 0.2 s, interval of 0.2 s and repeated pulses were used. The mode of application was either circular or radial. Pain occurred for about 1 week after treatment especially on movement (when lesions near joint) to all group and power density. Oozing occurred from lesion with scales and oedema after laser treatment for about 1 week. Post-inflammatory hypo-pigmentation might occur after the lesion have healed completely. No recurrence of lesions after complete healing of lesions. Complete healing of the lesion was noticed, no scarring after complete healing of lesion. Diode laser therapy of recalcitrant and extensive viral warts could be considered as a valuable alternative to other more traditional techniques. This treatment can offer a good result in eliminating the verrucae and their sequelae of recurrence, scarring and the post-operative pain.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The martial rights and duties (Rights and duties of a woman and a man)
...Show More Authors

This research addresses the relevance of men and women and the consequent provisions
such as dowry and alimony ... Of the like, marriage is to organize links masculinity and
femininity any sexual meeting between men and women a special system that must be
produces reproduction him and alone, which gets its reproduction in human kind, and has no
family and on the basis of private life is being organized.
The importance of the topic see Islam has urged marriage and forbade celibacy, and ensure
that the Lord of Glory Almighty married subsidy nor the origin of the differences between
men and women in money or workmanship or blue-chip Every Muslim inept any Muslim and
every Muslim efficient for any Muslim.
The impor

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 28 2024
Journal Name
Arab World English Journal
Cowboy as a Symbol of Individualism: A Pragmatic Analysis of Red Dead Redemption 2
...Show More Authors

As cultures are mainly divided into collectivistic and individualistic, members tend to emphasize, through communication, either their position as part of their group or their independence from the group. This emphasis is manifested in using the pragmatic concepts of positive politeness and negative politeness. The present study looks into the reflection of these two cultures in Rockstar’s renowned video game, Red Dead Redemption 2 (2018). It aims at identifying the two cultures as present in the game and showing their significance to its narrative. It fills the gap in the studies of language used within video games as well as its cultural reflections. The study addresses the following question: What are the positive and negative

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Waste as a resource of economic resources: A case study using environmentalthe index MIP
...Show More Authors

Due to increased consumption of resources, especially energy it was necessary to find alternatives characterized by the same quality as well as being of less expensive, and most important of these alternatives are characterized by waste and the fact that humancannot stop consumption. So we  have consideredwaste as an  alternative and cheap economic resources and by using environmental index the MIP (input materials per unit ,unit / service) is based on the grounds that the product is not the end of itselfit is a product to meet the need  of a product or service, awarded a resource input and output within the five basic elements are the raw materials is ecological, Raw materials ecological, water, air and soil erosion for a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 26 2022
Journal Name
Surgical Neurology International
Excellent recovery after nonmissile penetrating traumatic brain injury in a child: A case report
...Show More Authors
Background:

Nonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.

Case Description:

We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull bas

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Tue Mar 15 2011
Journal Name
Wassit Journal For Humanities
A Trace of Modern European Literary Currents in Arthur Miller's Death of a Salesman
...Show More Authors

Preview PDF
Publication Date
Mon Jun 03 2019
Journal Name
Al-kindy College Medical Journal
A Case Report -Bilateral Giant Achilles Tendon Xanthomas Resection with a Tendon transverse Technique
...Show More Authors

Background : Xanthomatosis is a disease in which large tendon tumors can occur, especially in the Achilles tendon. This disease is a rare interesting orthopaedic condition. Case Report:A case of a twenty eight year old girl patient with giant bilateral Achilles tendon xanthomas in which both tumors were resected. There was no ulceration on the both sides. The patient was treated by total resection of the lesion and reconstruction using tendon transfer of the Peroneus brevis and Flexor hallusis longus. Postoperative treatment consisted of six weeks lower leg cast immobilization followed by partial weight bearing. After 4 months the patient was able to walk pain free without any difficulties. It has been suggested that total resection with au

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 02 2016
Journal Name
European Academic Research
‘Resymbolization’ of a Text; a Relatively Different Perspective of Graham Greene’s The Quiet American
...Show More Authors

The Quiet American could be considered as one of Graham Greene’s most distinguished books; it is an epochal novel written during the phase of the cold war between the United States and the Soviet Union. The novel deals with the interference of the United States in Vietnam ten years before Vietnam’s war. The role the Americans played in arousing an inner political crisis in the country previous to her military invention. The book reflects that this action was not out of American government concern about Vietnamese people themselves but merely a political foreign affair. They wanted to stop communism from spreading widely and reducing its role in the East. This paper attempts to analyse the novel concentrating on the message Greene intend

... Show More
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Methods of Forecasting Credit Losses in A Sample of Iraqi Banks - A Comparative Analysis
...Show More Authors

  The general trend in Iraqi banks is focused towards the application of international financial reporting standards, especially the international financial reporting standard IFRS 9 “Financial Instruments”, in addition to the directives issued on the Central Bank of Iraq’s instructions for the year 2018 regarding the development of expected credit losses models, and not to adhere to a specific method for calculating these losses and authorizing the banks’ departments to adopt the method of calculating losses that suits the nature of the bank’s activity and to be consistent in its use from time to time. The research problem revolves around the different methodologies for calculatin

... Show More
View Publication Preview PDF
Crossref